1,546 research outputs found

    Development of a demanufacturing system modeling and simulation tool

    Get PDF
    This thesis develops a demanufacturing system modeling and simulation tool as an interface between simulation methods and demanufacturers. This tool can mimic the behavior of demanufacturing facility and obtain penetrable understanding of the system. By this modeling tool, one can intuitively analyze the behavior of a system and improve the operational efficiency. Detailed designs on the simulation tool including user interface, logic, and user view are presented in this thesis. The initial prototype version of the system modeling and simulation tool has been completed with fourteen modules in the developed template. Each object in the template refers to a specific demanufacturing activity and uses detailed simulation logic behind its design to perform that activity. The application to an electronic demanufacturing facility illustrates the usefulness of the interface to manage and improve the overall efficiency of facilities. This thesis also applies the simulation tool to a typical demanufacturing facility. Relevant system performance is analyzed. The comparison of different operational scenarios is made and the suggestion for better options of the system is discussed. This work is useful to assist designers in the design of efficient demanufacturing systems to tackle the environmental problems that may be caused by retired or faulty products

    Leading to the right? : Senator Jesse Helms and American foreign policy

    Get PDF
    制度:新 ; 報告番号:甲2757号 ; 学位の種類:博士(学術) ; 授与年月日:2009/3/15 ; 早大学位記番号:新495

    Genetic algorithm for the cargo shunting cooperation between two hub-and-spoke logistics networks

    Get PDF
    Purpose: The overstocked goods flow in the hub of hub-and-spoke logistics network should be disposed of in time, to reduce delay loss and improve the utilization rate of logistics network resources. The problem we need to solve is to let logistics network cooperate by sharing network resources to shunt goods from one hub-and-spoke network to another hub-and-spoke network. Design/methodology/approach: This paper proposes the hub shunting cooperation between two hub-and-spoke networks. Firstly, a hybrid integer programming model was established to describe the problem, and then a multi-layer genetic algorithm was designed to solve it and two hub-and-spoke networks are expressed by different gene segments encoded by genes. The network data of two third-party logistics companies in southern and northern China are used for example analysis at the last step. Findings: The hub-and-spoke networks of the two companies were constructed simultaneously. The transfer cost coefficient between two networks and the volume of cargo flow in the network have an impact on the computation of hubs that needed to be shunt and the corresponding cooperation hubs in the other network. Originality/value: Previous researches on hub-and-spoke logistics network focus on one logistics network, while we study the cooperation and interaction between two hub-and-spoke networks. It shows that two hub-and-spoke network can cooperate across the network to shunt the goods in the hub and improve the operation efficiency of the logistics network.Peer Reviewe

    Urokinase receptor and resistance to targeted anticancer agents

    Get PDF
    The urokinase receptor/uPAR is a GPI-anchored membrane protein, which regulates protease activity at the cell surface and, in collaboration with a system of co-receptors, triggers cell-signaling and regulates gene expression within the cell. In normal tissues, uPAR gene expression is limited; however, in cancer, uPAR is frequently over-expressed and the gene may be amplified. Hypoxia, which often develops in tumors, further increases uPAR expression by cancer cells. uPAR-initiated cell-signaling promotes cancer cell migration, invasion, metastasis, epithelial-mesenchymal transition, stem cell-like properties, survival, and release from states of dormancy. Newly emerging data suggest that the pro-survival cell-signaling activity of uPAR may allow cancer cells to escape from the cytotoxic effects of targeted anticancer drugs. Herein, we review the molecular properties of uPAR that are responsible for its activity in cancer cells and its ability to counteract the activity of anticancer drugs

    An Element-Wise Weights Aggregation Method for Federated Learning

    Get PDF
    Federated learning (FL) is a powerful Machine Learning (ML) paradigm that enables distributed clients to collaboratively learn a shared global model while keeping the data on the original device, thereby preserving privacy. A central challenge in FL is the effective aggregation of local model weights from disparate and potentially unbalanced participating clients. Existing methods often treat each client indiscriminately, applying a single proportion to the entire local model. However, it is empirically advantageous for each weight to be assigned a specific proportion. This paper introduces an innovative Element-Wise Weights Aggregation Method for Federated Learning (EWWA-FL) aimed at optimizing learning performance and accelerating convergence speed. Unlike traditional FL approaches, EWWA-FL aggregates local weights to the global model at the level of individual elements, thereby allowing each participating client to make element-wise contributions to the learning process. By taking into account the unique dataset characteristics of each client, EWWA-FL enhances the robustness of the global model to different datasets while also achieving rapid convergence. The method is flexible enough to employ various weighting strategies. Through comprehensive experiments, we demonstrate the advanced capabilities of EWWA-FL, showing significant improvements in both accuracy and convergence speed across a range of backbones and benchmarks

    Fast equilibrium reconstruction by deep learning on EAST tokamak

    Full text link
    A deep neural network is developed and trained on magnetic measurements (input) and EFIT poloidal magnetic flux (output) on the EAST tokamak. In optimizing the network architecture, we use automatic optimization in searching for the best hyperparameters, which helps the model generalize better. We compare the inner magnetic surfaces and last-closed-flux surfaces (LCFSs) with those from EFIT. We also calculated the normalized internal inductance, which is completely determined by the poloidal magnetic flux and can further reflect the accuracy of the prediction. The time evolution of the internal inductance in full discharges is compared with that provided by EFIT. All of the comparisons show good agreement, demonstrating the accuracy of the machine learning model, which has the high spatial resolution as the off-line EFIT while still meets the time constraint of real-time control

    A survey on vulnerability of federated learning: A learning algorithm perspective

    Get PDF
    Federated Learning (FL) has emerged as a powerful paradigm for training Machine Learning (ML), particularly Deep Learning (DL) models on multiple devices or servers while maintaining data localized at owners’ sites. Without centralizing data, FL holds promise for scenarios where data integrity, privacy and security and are critical. However, this decentralized training process also opens up new avenues for opponents to launch unique attacks, where it has been becoming an urgent need to understand the vulnerabilities and corresponding defense mechanisms from a learning algorithm perspective. This review paper takes a comprehensive look at malicious attacks against FL, categorizing them from new perspectives on attack origins and targets, and providing insights into their methodology and impact. In this survey, we focus on threat models targeting the learning process of FL systems. Based on the source and target of the attack, we categorize existing threat models into four types, Data to Model (D2M), Model to Data (M2D), Model to Model (M2M) and composite attacks. For each attack type, we discuss the defense strategies proposed, highlighting their effectiveness, assumptions and potential areas for improvement. Defense strategies have evolved from using a singular metric to excluding malicious clients, to employing a multifaceted approach examining client models at various phases. In this survey paper, our research indicates that the to-learn data, the learning gradients, and the learned model at different stages all can be manipulated to initiate malicious attacks that range from undermining model performance, reconstructing private local data, and to inserting backdoors. We have also seen these threat are becoming more insidious. While earlier studies typically amplified malicious gradients, recent endeavors subtly alter the least significant weights in local models to bypass defense measures. This literature review provides a holistic understanding of the current FL threat landscape and highlights the importance of developing robust, efficient, and privacy-preserving defenses to ensure the safe and trusted adoption of FL in real-world applications. The categorized bibliography can be found at: https://github.com/Rand2AI/Awesome-Vulnerability-of-Federated-Learning
    corecore